Tagged articles
12 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Apr 17, 2026 · Information Security

Master Linux Privilege Escalation: Risks, Exploits, and Hardening Guide

This comprehensive guide explains the most common Linux privilege‑escalation vectors—including unsafe SUID binaries, sudo misconfigurations, cron jobs, password and SSH‑key leaks, kernel vulnerabilities, container escapes, and file‑permission flaws—while providing concrete detection commands and practical hardening steps for each risk.

BashHardeningLinux security
0 likes · 23 min read
Master Linux Privilege Escalation: Risks, Exploits, and Hardening Guide
Black & White Path
Black & White Path
Feb 24, 2026 · Information Security

Common Privilege‑Escalation Vulnerabilities in Penetration Testing

This article systematically details the most frequently encountered privilege‑escalation flaws in penetration testing, covering Windows service misconfigurations, registry hijacking, kernel exploits, DLL hijacking, Linux SUID/SGID abuse, sudo misconfigurations, cron abuse, writable passwd files, and Docker escape techniques, along with step‑by‑step exploitation procedures and defensive recommendations.

CVESUIDWindows
0 likes · 29 min read
Common Privilege‑Escalation Vulnerabilities in Penetration Testing
Raymond Ops
Raymond Ops
Dec 11, 2025 · Operations

Unlock the Full Power of Linux Permissions: A Complete 12‑Bit Guide for Sysadmins

This article explains why misconfigured Linux permissions cause security incidents, breaks down the 12‑bit permission model—including file type, owner/group/others bits and special SUID, SGID, and sticky bits—provides numeric examples, real‑world case studies, advanced techniques like umask, ACLs, batch changes, and offers best‑practice security recommendations and troubleshooting tips.

ACLPermissionsSUID
0 likes · 10 min read
Unlock the Full Power of Linux Permissions: A Complete 12‑Bit Guide for Sysadmins
Liangxu Linux
Liangxu Linux
Aug 19, 2025 · Operations

Master Linux Permissions: From Basic rwx to SUID, ACL, and Hidden Attributes

This guide explains Linux file and directory permissions, covering basic rwx modes, numeric and symbolic chmod, ownership changes with chown/chgrp, special bits like SUID/SGID/SBIT, umask calculations, hidden attributes via chattr/lsattr, ACL management with setfacl/getfacl, and sudo configuration for secure privilege escalation.

ACLPermissionsSUID
0 likes · 51 min read
Master Linux Permissions: From Basic rwx to SUID, ACL, and Hidden Attributes
Liangxu Linux
Liangxu Linux
Feb 10, 2025 · Information Security

Master Linux File Permissions: From Basic rwx to Advanced ACLs

This guide explains Linux file and directory permissions, numeric and symbolic representations, special bits like SUID/SGID/sticky, ownership changes with chown/chgrp, default umask behavior, and detailed ACL usage with practical examples and command snippets.

ACLPermissionsSUID
0 likes · 27 min read
Master Linux File Permissions: From Basic rwx to Advanced ACLs
MaGe Linux Operations
MaGe Linux Operations
Jul 28, 2024 · Operations

Master Linux Permissions: Users, Groups, SUID/SGID, ACLs and sudo

This comprehensive guide explains Linux permission fundamentals, user and group management, file permission modes, special bits like SUID, SGID and Sticky, hidden attributes with chattr/lsattr, ACL configuration, and privilege escalation using su and sudo, complete with practical command examples.

ACLSGIDSUID
0 likes · 45 min read
Master Linux Permissions: Users, Groups, SUID/SGID, ACLs and sudo
MaGe Linux Operations
MaGe Linux Operations
Apr 14, 2024 · Fundamentals

Master Linux File Permissions: From chmod to ACL and umask

This guide explains Linux file permission concepts—including owner, group, and others permissions, numeric and symbolic representations, default settings, the role of umask, and advanced features like ACLs, special bits, and immutable attributes—while providing practical command examples for managing files and directories securely.

ACLFile PermissionsSUID
0 likes · 21 min read
Master Linux File Permissions: From chmod to ACL and umask
ITPUB
ITPUB
Nov 10, 2020 · Information Security

Master Linux Privilege Escalation: Techniques, Commands, and Exploits

This comprehensive guide explains Linux privilege escalation, covering horizontal and vertical privilege upgrades, essential information‑gathering commands, kernel vulnerability exploitation, sudo abuse, SUID/SGID misconfigurations, cron job hijacking, NFS weak permissions, and PATH misconfigurations, with practical examples and code snippets for each technique.

NFSSUIDcron
0 likes · 45 min read
Master Linux Privilege Escalation: Techniques, Commands, and Exploits